{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:CT37BE2WQGUSORQ3B2P24TUYUD","short_pith_number":"pith:CT37BE2W","canonical_record":{"source":{"id":"1904.07781","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2019-04-16T16:04:57Z","cross_cats_sorted":["eess.SP"],"title_canon_sha256":"b6826121d7c3004103dceee65b32e51f5f364256d2cc1f00fa54208b0bf10018","abstract_canon_sha256":"fecf626e75f32da90884a7d2fc1fa3ed5749160b48bd9962b09d0150d4e1f54f"},"schema_version":"1.0"},"canonical_sha256":"14f7f0935681a927461b0e9fae4e98a0f12328df7d7b4c2eefb69fe35bdcee4e","source":{"kind":"arxiv","id":"1904.07781","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1904.07781","created_at":"2026-05-17T23:48:24Z"},{"alias_kind":"arxiv_version","alias_value":"1904.07781v1","created_at":"2026-05-17T23:48:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.07781","created_at":"2026-05-17T23:48:24Z"},{"alias_kind":"pith_short_12","alias_value":"CT37BE2WQGUS","created_at":"2026-05-18T12:33:15Z"},{"alias_kind":"pith_short_16","alias_value":"CT37BE2WQGUSORQ3","created_at":"2026-05-18T12:33:15Z"},{"alias_kind":"pith_short_8","alias_value":"CT37BE2W","created_at":"2026-05-18T12:33:15Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:CT37BE2WQGUSORQ3B2P24TUYUD","target":"record","payload":{"canonical_record":{"source":{"id":"1904.07781","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2019-04-16T16:04:57Z","cross_cats_sorted":["eess.SP"],"title_canon_sha256":"b6826121d7c3004103dceee65b32e51f5f364256d2cc1f00fa54208b0bf10018","abstract_canon_sha256":"fecf626e75f32da90884a7d2fc1fa3ed5749160b48bd9962b09d0150d4e1f54f"},"schema_version":"1.0"},"canonical_sha256":"14f7f0935681a927461b0e9fae4e98a0f12328df7d7b4c2eefb69fe35bdcee4e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:48:24.250163Z","signature_b64":"oFCS0LKkLVbpIvbQOFNXHhqVVY0AOoUGHRKRcswhqCkrpqNxgodpFOMkOrnDNneDgQEfu3rHVBxgqVRZsskbDQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"14f7f0935681a927461b0e9fae4e98a0f12328df7d7b4c2eefb69fe35bdcee4e","last_reissued_at":"2026-05-17T23:48:24.249585Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:48:24.249585Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1904.07781","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:48:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"9C24plgVPD3FPXmuWoK+8PT+H4T6xdoKuDTxO9dRKfLtoH0E3o3hVTypUT2FOJDNoEMjz3+NUGGizmAnCalJBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T12:59:56.445205Z"},"content_sha256":"78b41ca340fa19d7ed987e1bc74e18fbab7985e97e209fd2f4f058346d428fbc","schema_version":"1.0","event_id":"sha256:78b41ca340fa19d7ed987e1bc74e18fbab7985e97e209fd2f4f058346d428fbc"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:CT37BE2WQGUSORQ3B2P24TUYUD","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Interference Avoidance in UAV-Assisted Networks: Joint 3D Trajectory Design and Power Allocation","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["eess.SP"],"primary_cat":"cs.NI","authors_text":"Ali Rahmati, Arupjyoti Bhuyan, Huaiyu Dai, Ismail Guvenc, Seyyedali Hosseinalipour, Xiaofan He, Yavuz Yapici","submitted_at":"2019-04-16T16:04:57Z","abstract_excerpt":"The use of the unmanned aerial vehicle (UAV) has been foreseen as a promising technology for the next generation communication networks. Since there are no regulations for UAVs deployment yet, most likely they form a network in coexistence with an already existed network. In this work, we consider a transmission mechanism that aims to improve the data rate between a terrestrial base station (BS) and user equipment (UE) through deploying multiple UAVs relaying the desired data flow. Considering the coexistence of this network with other established communication networks, we take into account t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.07781","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:48:24Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"9R3zy1nKCZVcqygyu9rYfnXMSMbbUAl43rjpAhn28LnFnnh4aV5HaTYhm1kIrQ6jKYUVGEUQoYUtX36o7OwhAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T12:59:56.445569Z"},"content_sha256":"7ca37bfab3a8a5a8dc71d7291d008da55debcedf71aa670e7f391461859ef816","schema_version":"1.0","event_id":"sha256:7ca37bfab3a8a5a8dc71d7291d008da55debcedf71aa670e7f391461859ef816"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/CT37BE2WQGUSORQ3B2P24TUYUD/bundle.json","state_url":"https://pith.science/pith/CT37BE2WQGUSORQ3B2P24TUYUD/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/CT37BE2WQGUSORQ3B2P24TUYUD/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T12:59:56Z","links":{"resolver":"https://pith.science/pith/CT37BE2WQGUSORQ3B2P24TUYUD","bundle":"https://pith.science/pith/CT37BE2WQGUSORQ3B2P24TUYUD/bundle.json","state":"https://pith.science/pith/CT37BE2WQGUSORQ3B2P24TUYUD/state.json","well_known_bundle":"https://pith.science/.well-known/pith/CT37BE2WQGUSORQ3B2P24TUYUD/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:CT37BE2WQGUSORQ3B2P24TUYUD","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"fecf626e75f32da90884a7d2fc1fa3ed5749160b48bd9962b09d0150d4e1f54f","cross_cats_sorted":["eess.SP"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2019-04-16T16:04:57Z","title_canon_sha256":"b6826121d7c3004103dceee65b32e51f5f364256d2cc1f00fa54208b0bf10018"},"schema_version":"1.0","source":{"id":"1904.07781","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1904.07781","created_at":"2026-05-17T23:48:24Z"},{"alias_kind":"arxiv_version","alias_value":"1904.07781v1","created_at":"2026-05-17T23:48:24Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1904.07781","created_at":"2026-05-17T23:48:24Z"},{"alias_kind":"pith_short_12","alias_value":"CT37BE2WQGUS","created_at":"2026-05-18T12:33:15Z"},{"alias_kind":"pith_short_16","alias_value":"CT37BE2WQGUSORQ3","created_at":"2026-05-18T12:33:15Z"},{"alias_kind":"pith_short_8","alias_value":"CT37BE2W","created_at":"2026-05-18T12:33:15Z"}],"graph_snapshots":[{"event_id":"sha256:7ca37bfab3a8a5a8dc71d7291d008da55debcedf71aa670e7f391461859ef816","target":"graph","created_at":"2026-05-17T23:48:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"The use of the unmanned aerial vehicle (UAV) has been foreseen as a promising technology for the next generation communication networks. Since there are no regulations for UAVs deployment yet, most likely they form a network in coexistence with an already existed network. In this work, we consider a transmission mechanism that aims to improve the data rate between a terrestrial base station (BS) and user equipment (UE) through deploying multiple UAVs relaying the desired data flow. Considering the coexistence of this network with other established communication networks, we take into account t","authors_text":"Ali Rahmati, Arupjyoti Bhuyan, Huaiyu Dai, Ismail Guvenc, Seyyedali Hosseinalipour, Xiaofan He, Yavuz Yapici","cross_cats":["eess.SP"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2019-04-16T16:04:57Z","title":"Interference Avoidance in UAV-Assisted Networks: Joint 3D Trajectory Design and Power Allocation"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1904.07781","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:78b41ca340fa19d7ed987e1bc74e18fbab7985e97e209fd2f4f058346d428fbc","target":"record","created_at":"2026-05-17T23:48:24Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"fecf626e75f32da90884a7d2fc1fa3ed5749160b48bd9962b09d0150d4e1f54f","cross_cats_sorted":["eess.SP"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.NI","submitted_at":"2019-04-16T16:04:57Z","title_canon_sha256":"b6826121d7c3004103dceee65b32e51f5f364256d2cc1f00fa54208b0bf10018"},"schema_version":"1.0","source":{"id":"1904.07781","kind":"arxiv","version":1}},"canonical_sha256":"14f7f0935681a927461b0e9fae4e98a0f12328df7d7b4c2eefb69fe35bdcee4e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"14f7f0935681a927461b0e9fae4e98a0f12328df7d7b4c2eefb69fe35bdcee4e","first_computed_at":"2026-05-17T23:48:24.249585Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:48:24.249585Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"oFCS0LKkLVbpIvbQOFNXHhqVVY0AOoUGHRKRcswhqCkrpqNxgodpFOMkOrnDNneDgQEfu3rHVBxgqVRZsskbDQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:48:24.250163Z","signed_message":"canonical_sha256_bytes"},"source_id":"1904.07781","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:78b41ca340fa19d7ed987e1bc74e18fbab7985e97e209fd2f4f058346d428fbc","sha256:7ca37bfab3a8a5a8dc71d7291d008da55debcedf71aa670e7f391461859ef816"],"state_sha256":"7073b16130eced21de958a69788ad2c1d1c71aa6da3364e0deebc3d175fa69e8"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"BZaosWJJqyUx7XhSPeRfH4xX6u4dkE/x7ZkjqaARkHHEwI822WizkgWKfAuWAMZ50GiVL35+KWdH3C34Tkf1BA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T12:59:56.447192Z","bundle_sha256":"bd74cf1beb9e62dbd603161b1b70c62a580d317595b715d2c0ec9284465cc8c6"}}